Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 22:41
Behavioral task
behavioral1
Sample
8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe
Resource
win10v2004-20241007-en
General
-
Target
8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe
-
Size
78KB
-
MD5
78a541cd7cdded6718be2d77a9777440
-
SHA1
4c383ad0056e50c5cb077666e61995d753472bb5
-
SHA256
8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8
-
SHA512
8565584ac9743dcdcc0f65bfb1147c77a33bd78a8300e917344990652ab3895c5a307c57bf5b839b4b08ff784e58145a919beb6a19cf354c2be230cb1b1982fa
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+jPIC:5Zv5PDwbjNrmAE+7IC
Malware Config
Extracted
discordrat
-
discord_token
MTMyNDA4OTE0OTM2MzMyNjk3Nw.GC8frp.HLqqcaLZBagbe-6YPLoLZO2HuHlqK4JaSVgeLw
-
server_id
1324089576436011021
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 772 3056 8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe 30 PID 3056 wrote to memory of 772 3056 8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe 30 PID 3056 wrote to memory of 772 3056 8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe"C:\Users\Admin\AppData\Local\Temp\8dac539410ea467862ba7ef72f21c9c21553ad711e468653bf12ab6380d76bd8N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3056 -s 6002⤵PID:772
-